Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Growth of Wireless Internet Opens New Path for Thieves
The New York Times ^ | March 19, 2005 | Seth Schiesel

Posted on 03/19/2005 6:55:21 AM PST by MississippiMasterpiece

The spread of the wireless data technology known as Wi-Fi has reshaped the way millions of Americans go online, letting them tap into high-speed Internet connections effortlessly at home and in many public places.

But every convenience has its cost. Federal and state law enforcement officials say sophisticated criminals have begun to use the unsecured Wi-Fi networks of unsuspecting consumers and businesses to help cover their tracks in cyberspace.

In the wired world, it was often difficult for lawbreakers to make themselves untraceable on the Internet. In the wireless world, with scores of open Wi-Fi networks in some neighborhoods, it could hardly be easier.

Law enforcement officials warn that such connections are being commandeered for child pornography, fraud, death threats and identity and credit card theft.

"We have known for a long time that the criminal use of the Internet was progressing at a greater rate than law enforcement had the knowledge or ability to catch up," said Jan H. Gilhooly, who retired last month as special agent in charge of the Secret Service field office in Newark and now helps coordinate New Jersey operations for the Department of Homeland Security. "Now it's the same with the wireless technologies."

In 2003, the Secret Service office in Newark began an investigation that infiltrated the Web sites and computer networks of suspected professional data thieves. Since October, more than 30 people around the world have been arrested in connection with the operation and accused of trafficking in hundreds of thousands of stolen credit card numbers online.

Of those suspects, half regularly used the open Wi-Fi connections of unsuspecting neighbors. Four suspects, in Canada, California and Florida, were logged in to neighbors' Wi-Fi networks at the moment law enforcement agents, having tracked them by other means, entered their homes and arrested them, Secret Service agents involved in the case said.

More than 10 million homes in the United States now have a Wi-Fi base station providing a wireless Internet connection, according to ABI, a technology research firm in Oyster Bay, N.Y. There were essentially none as recently as 2000, the firm said. Those base stations, or routers, allow several computers to share a high-speed Internet connection and let users maintain that connection as they move about with laptops or other mobile devices. The routers are also used to connect computers with printers and other devices.

Experts say most of those households never turn on any of the features, available in almost all Wi-Fi routers, that change the system's default settings, conceal the connection from others and encrypt the data sent over it. Failure to secure the network in those ways can allow anyone with a Wi-Fi-enabled computer within about 200 feet to tap into the base station's Internet connection, typically a digital subscriber line or a cable modem.

Wi-Fi connections are also popping up in retail locations across the country. But while national chains like Starbucks take steps to protect their networks, independent coffee shops that offer Wi-Fi often leave their connections wide open, law enforcement officials say.

In addition, many universities are now blanketing campuses with open Wi-Fi networks, and dozens of cities and towns are creating wireless grids. While some locations charge a fee or otherwise force users to register, others leave the network open. All that is needed to tap in is a Wi-Fi card, typically costing $30 or less, for the user's PC or laptop. (Wi-Fi cards contain an identification code that is potentially traceable, but that information is not retained by most consumer routers, and the cards can in any case be readily removed and thrown away.)

When criminals operate online through a Wi-Fi network, law enforcement agents can track their activity to the numeric Internet Protocol address corresponding to that connection. But from there the trail may go cold, in the case of a public network, or lead to an innocent owner of a wireless home network.

"We had this whole network set up to identify these guys, but the one thing we had to take into consideration was Wi-Fi," Mr. Gilhooly said. "If I get to an Internet address and I send a subpoena to the Internet provider and it gets me a name and physical address, how do I know that that person isn't actually bouncing in from next door?"

Mr. Gilhooly said the possibility of crashing into an innocent person's home forced his team to spend additional time conducting in-person surveillance before making arrests. He said the suspects tracked in his investigation would regularly advise one another on the best ways to gain access to unsecured Wi-Fi systems.

"We intercepted their private conversations, and they would talk and brag about, 'Oh yeah, I just got a new amplifier and a new antenna and I can reach a quarter of a mile,' " he said. "Hotels are wide open. Universities, wide open."

Sometimes, suspected criminals using Wi-Fi do not get out of their car. At 5 a.m. one day in November 2003, the Toronto police spotted a wrong-way driver "with a laptop on the passenger seat showing a child pornography movie that he had downloaded using the wireless connection in a nearby house," said Detective Sgt. Paul Gillespie, an officer in the police sex crimes unit.

The suspect was charged with child pornography violations in addition to theft of telecommunications services; the case is pending. "The No. 1 challenge is that people are committing all sorts of criminal activity over the Internet using wireless, and it could trace back to somebody else," Sergeant Gillespie said.

Holly L. Hubert, the supervisory special agent in charge of the Cyber Task Force at the F.B.I. field office in Buffalo, said the use of Wi-Fi was making it much more difficult to track down online criminals.

"This happens all the time, and it's definitely a challenge for us," she said. "We'll track something to a particular Internet Protocol address and it could be an unsuspecting business or home network that's been invaded. Oftentimes these are a dead end for us."

Ms. Hubert says one group of hackers she has been tracking has regularly frequented a local chain of Wi-Fi-equipped tea and coffee shops to help cover its tracks.

Many times the suspects can find a choice of unsecured wireless networks right from home. Special Agent Bob Breeden, supervisor of the computer crime division for the Florida Department of Law Enforcement, said a fraud investigation led in December to the arrest of a Tallahassee man who had used two Wi-Fi networks set up by residents in his apartment complex.

Over those Internet connections, the suspect used the electronic routing information for a local college's bank account to pay for online pornography and to order sex-related products, Mr. Breeden said. The man was caught because he had the products delivered to his actual address, Mr. Breeden said. When officers went to arrest him, they found his computer set up to connect to a neighbor's wireless network. Mr. Breeden said the suspect, Abdul G. Wattley, pleaded guilty to charges of theft and unauthorized use of a communications network and was sentenced to two years' probation.

In another recent case, the principal of a Tallahassee high school had received death threats by e-mail, Mr. Breeden said. When authorities traced the messages to a certain Internet Protocol address and went to the household it corresponded to, Mr. Breeden said, "Dad has his laptop sitting on a table and Mom has another laptop, and of course they have Wi-Fi, and they clearly didn't know anything about the threats."

Cybercrime has been known to flourish even without Wi-Fi's cloak of anonymity; no such link has been found, for example, in recent data thefts from ChoicePoint, Lexis/Nexis and other database companies.

But unsecured wireless networks are nonetheless being looked at by the authorities as a potential tool for furtive activities of many sorts, including terrorism. Two federal law enforcement officials said on condition of anonymity that while they were not aware of specific cases, they believed that sophisticated terrorists might also be starting to exploit unsecured Wi-Fi connections.

In the end, prevention is largely in the hands of the buyers and sellers of Wi-Fi equipment. Michael Coe, a spokesman for SBC, the nation's No. 1 provider of digital subscriber line connections, said the company had provided about one million Wi-Fi routers to its customers with encryption turned on by default. But experts say most consumers who spend the $60 to $80 for a Wi-Fi router are just happy to make it work at all, and never turn on encryption.

"To some degree, most consumers are intimidated by the technology," said Roberta Wiggins, a wireless analyst at the Yankee Group, a technology research firm in Boston. "There is a behavior that they don't want to further complicate their options."

That attitude makes life easier for tech-savvy criminals and tougher for those who pursue them. "The public needs to realize that all they're doing is making it harder on me to go find the bad guys," said Mr. Gilhooly, the former Secret Service agent. "How would you feel if you're sitting at home and meanwhile someone is using your Wi-Fi to hack a bank or hack a company and downloads a million credit card numbers, which happens all the time? I come to you and knock on your door, and all you can say is, 'Oops.' "


TOPICS: Business/Economy; Crime/Corruption; Culture/Society; News/Current Events
KEYWORDS: cybercrime; donutwatch; internet; leo; wifi; wireless
Navigation: use the links below to view more comments.
first 1-2021-36 next last
Special Agent Bob Breeden of the Florida Department of Law Enforcement said several cases were traced to wireless networks in Tallahassee.

1 posted on 03/19/2005 6:55:21 AM PST by MississippiMasterpiece
[ Post Reply | Private Reply | View Replies]

To: MississippiMasterpiece

Going WiFi right now....


2 posted on 03/19/2005 6:57:00 AM PST by Drango (All my ideas, good or bad, are stolen from other FReepers)
[ Post Reply | Private Reply | To 1 | View Replies]

To: MississippiMasterpiece

It's an easy fix; set up your LAN security measures.


3 posted on 03/19/2005 6:59:04 AM PST by demlosers (We win. They lose. USA number 1 ! Drill ANWR !)
[ Post Reply | Private Reply | To 1 | View Replies]

To: demlosers
It's an easy fix; set up your LAN security measures.

Besides firewall and virus software, is password setup, and data encryption for the wifi enough?
4 posted on 03/19/2005 7:09:53 AM PST by evaporation-plus
[ Post Reply | Private Reply | To 3 | View Replies]

To: MississippiMasterpiece

Thank you for the lesson.
Outside of Mississipi, folks other places prefer getting to the point a little sooner.
Of f the top: list the first 5 things everybody ought to do.
Make #6: Hire You.


5 posted on 03/19/2005 7:12:28 AM PST by CBart95
[ Post Reply | Private Reply | To 1 | View Replies]

To: evaporation-plus

http://www.dslreports.com/forums/all

check here for great advice and information...


6 posted on 03/19/2005 7:14:45 AM PST by Drango (All my ideas, good or bad, are stolen from other FReepers)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Drango

Make it secure.


7 posted on 03/19/2005 7:16:04 AM PST by television is just wrong (Our sympathies are misguided with illegal aliens...)
[ Post Reply | Private Reply | To 2 | View Replies]

To: evaporation-plus
I'm a belt and suspenders kind of guy, so my suggestion is threefold:

1) Enable WEP encryption on the link
2) Disable SSID broadcasting
3) Enable MAC filtering and whitelist only the machines you want to have access to your network.

8 posted on 03/19/2005 7:27:53 AM PST by general_re ("Frantic orthodoxy is never rooted in faith, but in doubt." - Reinhold Niebuhr)
[ Post Reply | Private Reply | To 4 | View Replies]

To: ShadowAce

ping


9 posted on 03/19/2005 7:27:58 AM PST by KoRn (~Halliburton Told Me......)
[ Post Reply | Private Reply | To 1 | View Replies]

To: demlosers; MississippiMasterpiece
It's an easy fix; set up your LAN security measures

You know that, and I know that, but lots of unsuspecting consumers don't know about it. The router manufacuters need to have wizzards that make it easy for end users to configure secure wireless networks.

10 posted on 03/19/2005 7:30:21 AM PST by Paleo Conservative (I Hey! Hey! Ho! Ho! Andrew Heyward's got to go!)
[ Post Reply | Private Reply | To 3 | View Replies]

To: MississippiMasterpiece
bookmarked for later read!
11 posted on 03/19/2005 7:38:15 AM PST by RoseofTexas
[ Post Reply | Private Reply | To 1 | View Replies]

To: general_re
1) Enable WEP encryption on the link
2) Disable SSID broadcasting
3) Enable MAC filtering and whitelist only the machines you want to have access to your network.

Of course if anyone wants to add an aditional computer to the network you need to have an IT person available. This makes WiFi problematic to use in a conference room especially on a weekend.

I am rather wary using publicly available WiFi networks due to the lack of security on them. Why should I be required to have unencrypted communications on networks I'm just pasing through? There are gas stations that are beginning to have free WiFi available as a convenience for travelers. Why would I want to use them to check email or my bank accounts if I can't get a secure connection?

12 posted on 03/19/2005 7:42:24 AM PST by Paleo Conservative (I Hey! Hey! Ho! Ho! Andrew Heyward's got to go!)
[ Post Reply | Private Reply | To 8 | View Replies]

To: MississippiMasterpiece

The reason most consumers never set up encryption is the difficulty. The security elements of Wi-Fi are confusing and intimidating to the typical surfer. WEP. WPA. Authentication. Blah blah blah. This aspect needs to be vastly simplified on consumer routers, something along the lines of one click to TURN ON PASSPHRASE PROTECTION, set the phrase, and you're done.

MM


13 posted on 03/19/2005 7:49:06 AM PST by MississippiMan (Americans should not be sacrificed on the altar of political correctness.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Paleo Conservative

There's always some trade-off between security and convenience. For the local coffee shop or gas station, which expects to have many random people connecting, that would not be an appropriate setup - adding new machines is somewhat inconvenient. For a home user with a relatively static set of machines that should be allowed to connect, and who doesn't want to serve as an ISP for the whole world, it's a reasonably secure setup. You could even up the security (and the inconvenience) somewhat by using a strong preshared WPA key and disabling DHCP (assign the wireless machines a static IP) on the AP. Again, this is not convenient insofar as it takes some work to set it up, but the end result is a highly secure wireless connection.


14 posted on 03/19/2005 7:55:54 AM PST by general_re ("Frantic orthodoxy is never rooted in faith, but in doubt." - Reinhold Niebuhr)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Egon; Eb Wilson
1) Enable WEP encryption on the link
2) Disable SSID broadcasting
3) Enable MAC filtering and whitelist only the machines you want to have access to your network.

Ping

15 posted on 03/19/2005 8:08:29 AM PST by RhoTheta
[ Post Reply | Private Reply | To 8 | View Replies]

To: MississippiMasterpiece

btt


16 posted on 03/19/2005 8:11:49 AM PST by dennisw ("What is Man that thou art mindful of him")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Paleo Conservative

"Of course if anyone wants to add an aditional computer to the network you need to have an IT person available. This makes WiFi problematic to use in a conference room especially on a weekend."

Agreed. Unfortunately, that IT guy was me. :)


17 posted on 03/19/2005 8:19:56 AM PST by L98Fiero
[ Post Reply | Private Reply | To 12 | View Replies]

To: MississippiMasterpiece
There are perhaps 5 different manufacturers of WiFi routers sold in the US.

One would think that it would be to their benefit to make it easier to activate all the security devices in the equipment they sell
I am lucky to have two sons who do it for a living, otherwise I would be as vulnerable as most.

Here's the problem: every time a router or a computer is replaced and the settings have to be restored, not once has the process gone as smoothly and straightforward as it should. So it is not surprising that most people give up.

However, there is a ray of hope. At least we can test our computer/wi-fi setups to see if everything is working as it should:

Vulnerability Check

18 posted on 03/19/2005 8:22:55 AM PST by Publius6961 (The most abundant things in the universe are ignorance, stupidity and hydrogen)
[ Post Reply | Private Reply | To 1 | View Replies]

To: general_re
You know, dear friend, you are really trying to help, but that list is useless to someone bewildered by technology.

Giving a step by step example might help, though; even if the example doesn't correspond exactly to the setups others might have.

For example, what's a WEP?
What's an SSID?
What's a MAC?

19 posted on 03/19/2005 8:35:16 AM PST by Publius6961 (The most abundant things in the universe are ignorance, stupidity and hydrogen)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Publius6961

For SBC DSL customers, the 2wire router/modem http://www.2wire.com/ comes with good default security but it cost 2-3 more than some of the others.


20 posted on 03/19/2005 8:37:30 AM PST by Drango (All my ideas, good or bad, are stolen from other FReepers)
[ Post Reply | Private Reply | To 18 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-36 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson